ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: measures
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things
Selvaraj Seerangan,Thangarajan Ramasamy
#Parental object relationship
#SIoT
#social object relationship
#CLOR
#C-WOR
#ownership object relationship
Feature Selection Method Based on Consecutive Forward Selection and Backward Elimination Concepts Using a Weighted Vector
Luai Al-Shalabi
#Feature selection
#forward-backward
#chi-square
#classification
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Loitering Based Human Crime Detection in Video Surveillance using Beluga Whale Adam Dingo Optimizer and Deep Convolutional Neural Network
Nischita Waddenkery,Shridevi Soma
#Video surveillance
#loitering behavior
#human crime detection
#enhanced euclidean distance
#deep learning
Improved Collaborative Filtering Recommender System Based on Hybrid Similarity Measures
Mohamed Abdi,George Okeyo,Ronald Mwangi
#Recommender systems
#collaborative filtering
#similarity measure
#Adjusted Triangle similarity
#Jaccard similarity
#user rating preference behavior
Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Mohammad Alia,Adnan Hnaif,Aseel Alrawashdeh,Yousef Jaradat,Mohammad Masoud,Ahmad Manasrah,Ahmad AlShanty
#Particle swarm optimization
#discrete wavelet transform
#discrete cosine transform
#denosing network
#additive white gaussian noise
#peak signal-to-noise ratio
#normalized correlation coefficient
HYAQP: A Hybrid Meta-Heuristic Optimization Model for Air Quality Prediction Using Unsupervised Machine Learning Paradigms
Praveena Vasudevan,Chitra Ekambaram
#Meta-heuristic
#unsupervised machine learning
#hybrid optimization
#optimized k-means
#air quality prediction
RSO based Optimization of Random Forest Classifier for Fault Detection and Classification in Photovoltaic Arrays
Khaled Baradieh,Mohd Zainuri,Mohamed Kamari,Yushaizad Yusof,Huda Abdullah,Mohd Zaman,Mohd Zulkifley
#Classifier
#diagnosis
#fault classification
#fault detection
#machine learning
#optimization
#photovoltaic
#pv
#random forest
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach
Gokul Narayanan,Saravanaguru Kannan
#Virtual machine
#migration
#downtime
#migration time
#security
#optimization algorithm
#gorilla-based shuffled shepherd optimization approach
Using Machine Learning Techniques for Subjectivity Analysis based on Lexical and Non-lexical Features
Hikmat Ullah Khan,Ali Daud
#Machine Learning
#classification
#opinion mining
#lexicon
#non-lexical features
A Bi-Level Text Classification Approach for SMS Spam Filtering and Identifying Priority Messages
Naresh Kumar Nagwani
#SMS spam
#priority sms
#important sms
#sms spam filtering
#bi-level binary classification
Muzzle Classification Using Neural Networks
Ibrahim El-Henawy, Hazem El-bakry, and Hagar El-Hadad
#Muzzle classification
#image processing
#neural networks
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer
Mohan Allam,Nandhini Malaiyappan
#Hybrid feature selection
#binary teaching learning based optimization
#neighborhood component analysis
New Model of Feature Selection based Chaotic Firefly Algorithm for Arabic Text Categorization
Meryeme Hadni,Hassane Hjiaj
#Chaotic method
#firefly algorithm
#arabic text categorization
#feature selection
Machine Learning Models for Statistical Analysis
Marko Grebovic,Luka Filipovic,Ivana Katnic,Milica Vukotic,Tomo Popovic
#Machine learning
#artificial neural networks
#statistical models
#accuracy measures
A Method of Extracting Malware Features Based on Gini Impurity Increment and Improved TF-IDF
Shimiao Sun,Yashu Liu
#Gini impurity increment
#TF-IDF
#feature selection
#dimensionality reduction
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint